Security update for buildah, caasp-cli, caasp-dex, cni-plugins, container-feeder, containerd-kubic, cri-o, cri-tools, docker-kubic, docker-runc-kubic, etcd, flannel, golang-github-docker-libnetwork-ku
Announcement ID: | SUSE-SU-2018:4218-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves three vulnerabilities can now be installed.
Description:
This update for buildah, caasp-cli, caasp-dex, cni-plugins, container-feeder, containerd-kubic, cri-o, cri-tools, docker-kubic, docker-runc-kubic, etcd, flannel, golang-github-docker-libnetwork-kubic, helm, kubernetes, kubernetes-dns, libcontainers-storage, podman, runc, skopeo, umoci fixes the following issues:
- Require golang = 1.10 to fix:
- bsc#1118897 CVE-2018-16873
go#29230 cmd/go: remote command execution during "go get -u" - bsc#1118898 CVE-2018-16874
go#29231 cmd/go: directory traversal in "go get" via curly braces in import paths - bsc#1118899 CVE-2018-16875
go#29233 crypto/x509: CPU denial of service
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE CaaS Platform 3.0
To install this update, use the SUSE CaaS Platform 'skuba' tool. It will inform you if it detects new updates and let you then trigger updating of the complete cluster in a controlled way.
Package List:
-
SUSE CaaS Platform 3.0 (x86_64)
- cri-o-1.10.6-4.11.1
- etcdctl-3.3.1-3.3.1
- cri-tools-1.0.0beta2-3.6.1
- golang-github-docker-libnetwork-kubic-debugsource-0.7.0.1+gitr2066_7b2b1feb1de4-3.3.1
- caasp-cli-3.0.0+20180515.git_r38_7843d12-3.3.1
- libcontainers-storage-0+git26204-3.3.1
- docker-runc-kubic-debuginfo-1.0.0rc4+gitr3338_3f2f8b84a77f-5.3.1
- docker-runc-kubic-debugsource-1.0.0rc4+gitr3338_3f2f8b84a77f-5.3.1
- kubernetes-client-1.10.11-4.11.1
- kubernetes-node-1.10.11-4.11.1
- docker-libnetwork-kubic-0.7.0.1+gitr2066_7b2b1feb1de4-3.3.1
- cni-plugins-0.6.0-4.3.1
- helm-2.8.2-3.3.1
- docker-libnetwork-kubic-debuginfo-0.7.0.1+gitr2066_7b2b1feb1de4-3.3.1
- podman-0.8.5-3.6.1
- docker-runc-kubic-1.0.0rc4+gitr3338_3f2f8b84a77f-5.3.1
- kubernetes-kubelet-1.10.11-4.11.1
- containerd-kubic-debuginfo-0.2.9+gitr706_06b9cb351610-5.3.1
- etcd-3.3.1-3.3.1
- runc-1.0.0~rc5-3.3.1
- docker-kubic-17.09.1_ce-7.3.1
- container-feeder-3.0.0+20181105.git_r90_c54fd18-3.9.1
- kubernetes-master-1.10.11-4.11.1
- kubernetes-common-1.10.11-4.11.1
- runc-debuginfo-1.0.0~rc5-3.3.1
- containerd-kubic-0.2.9+gitr706_06b9cb351610-5.3.1
- docker-kubic-debuginfo-17.09.1_ce-7.3.1
- docker-kubic-debugsource-17.09.1_ce-7.3.1
- containerd-kubic-debugsource-0.2.9+gitr706_06b9cb351610-5.3.1
- runc-debugsource-1.0.0~rc5-3.3.1
References:
- https://www.suse.com/security/cve/CVE-2018-16873.html
- https://www.suse.com/security/cve/CVE-2018-16874.html
- https://www.suse.com/security/cve/CVE-2018-16875.html
- https://bugzilla.suse.com/show_bug.cgi?id=1118897
- https://bugzilla.suse.com/show_bug.cgi?id=1118898
- https://bugzilla.suse.com/show_bug.cgi?id=1118899